Wireless Honeypots. Created by: Sponsored by: Final Documentation. Volume 2 Product and Process Documentation

Size: px
Start display at page:

Download "Wireless Honeypots. Created by: Sponsored by: Final Documentation. Volume 2 Product and Process Documentation"

Transcription

1 Wireless Honeypots Created by: Sponsored by: Final Documentation Volume 2 Product and Process Documentation April 25, 2005

2 Product and Process Documentation Introduction A honeypot is a node on a network whose purpose is to provide an environment designed to entice intruders. Once the intruder has been enticed and hacks into the honeypot, all of his or her actions are logged at kernel level. These logs are incapable of being altered by the intruder and they are a useful tool for analyzing the intruder s hacking techniques. They may also indicate the intruder s interests in the honeypot system and thus be a basis for improving security in other nodes on the network. Product Objectives The biggest objective for this product was to create a stand-alone wireless honeypot. This kind of product does not exist on the market today and it is part of an extremely cutting-edge technology. The product also needed to be portable and platform independent, so to meet these requirements our team re-mastered Linux and made it available on a bootable live mini-cd. To meet the wireless capabilities of the honeypot, an ordinary computer had to be turned into a wireless access point. In addition to this, the honeypot environment had to be enticing and authentic enough to capture the intruder s attention, but at the same time it had to limit the intruder s capabilities of launching attacks from the honeypot onto the network or compromising the honeypot itself. Multiple scripts were written in order to re-create a real environment but with very limited capabilities. Finally to be able to use the honeypot as a research tool as well as a deterrent, all activity on the honeypot, meaning all key-strokes, is logged. Product Process First and Second Draft Designs The first idea for creating the wireless honeypot was to use a wireless router with 4 computers to turn then into the honeypot. The plan was to modify the firmware on the router, creating a false file system, and using three other computers to become the honeypot system. One of the computers would run the freeware honeyd honeypot, another would do all the logging, the third would be the (IDS) Intrusion Detection System and the fourth would be a gateway to the internet. Shortly after some reanalysis, it was found that only 3 computers would be necessary because the router would be enough to be a gateway to the internet. The way these components would interact would be to allow only one was traffic from the router to the honeypot. Logging would also only be one way, all activity from the honeypot would be logged, but there would be no access from the honeypot to the logger or from the router to the logger. Also, the IDS would act as a logger and detection system to monitor for intruders on any of the 3 computers. After spending numerous weeks on this design it was thrown out for a couple of reasons, one of the reasons being the size of the physical honeypot since it required 3 computers and a router. The second reason was the inability to modify the router firmware as it is a read-only file system, resulting in an ineffective system. Figure 1 on the next page shows an example of the second draft design. TheHive-FDR-vol2 Page 1 of 5 4/24/2005

3 Production Network INTRUDER Internet Router (handles authentication) Logging Server HONEYPOT IDS (Snort) Figure 1: Second Draft Design Third Draft Design After more extensive research and brainstorming a third and final solution was developed. Instead of using many different computers as components in a honeypot system, it became more logical to create the stand-alone wireless honeypot in a customized operating system and bootable from a live mini-cd. This honeypot would have the honeyd freeware, logging capabilities, arpd and dhcp, HostAP and NIC all in the same operating system. Please refer to Figure 2 for a structural representation of the third draft design. Having found the honeyd software as the basis for the honeypot, the next step was to decide on an operating system to host its environment. Several operating systems were tried, each was ineffective for some reason, Knoppix STD was too large and required to many files to be removed to scale it down enough, DSL Linux was not good either because it did not run well on the computers that were used. Eventually Feather Linux was settled on and it was stripped of all unnecessary functions, files, executables, etc. It was scaled down to the bare minimum. The next step was to write scripts for the honeypot to control the intruder s actions by limiting their ability to move around in the file system or to create/destroy any files. Scripts for SSH, telnet, pop3, and HTTP were written and each script was mapped to the respective port number. Thus when the intruder attempts to log into the telnet port or the HTTP port, the respective scripts will be run on those ports instead of the actual applications. Please see Figure 3 for a flowchart of the intruder s movements through the honeypot and the different scripts that could be accessed. TheHive-FDR-vol2 Page 2 of 5 4/24/2005

4 DHCP Honeyd HostAP + Wireless NIC Sebek/syslogd Flash Drive OS Applications Hardware Figure 2: Third Draft Design TheHive-FDR-vol2 Page 3 of 5 4/24/2005

5 Intruder port scan of Honeyd IP Honeyd logs scan Runs script associated with port Port Path SSH/Telnet (Port 22, 23) POP (Port 110) HTTP (Port 80) Run authentication script Run POP3 emulation script Log commands Show spoofed webpage Log commands Authentication Authorized Denied Log attempted user names and passwords Read commands from attacker Self shutdown OR Intruder stops browsing Figure 3: Flow Chart TheHive-FDR-vol2 Page 4 of 5 4/24/2005

6 To create the wireless capabilities a Network Interface Card (NIC) was used in connection with HostAP to spoof wireless network traffic. HostAP is a freeware application that sends out beacon frames which imitate packets on a real network, thus transforming out NIC into an access point where an intruder may think he is on an actual network. In addition, DHCP spoofs IP addresses which also helps to make the wireless access point look more authentic, but also allows the intruder to believe its authenticity since it will allocate an IP address for the intruder to connect into when he or she request a connection to the honeypot network. Through these applications the honeypot becomes a wireless honeypot. With the aid of Sebek and Syslogd, logging is available on the honeypot. The logging is set up at the user and kernel levels and all logs are stored on an external flash drive. The drive is mounted, the logs are saved and backed up on the flash drive, and then the drive is demounted. It is practically impossible for the intruder to detect the mounting and demounting of the flash drive, thus it is the safest way to store the logs without allowing them to be compromised. Conclusion To create the product, the design went through a few extensive design stages. With each new implementation, the design became more accurate, simple, and precise. All of the above listed components combine to create the product, a wireless honeypot. Without one of these components, the honeypot would either be useless or it could be easily compromised, thus all need to be present and work together to create the final product. TheHive-FDR-vol2 Page 5 of 5 4/24/2005

Firewall Identification: Banner Grabbing

Firewall Identification: Banner Grabbing Honey POt Firewall Identification: Banner Grabbing Banners are messages sent out by network services during the connection to the service. Banners announce which service is running on the system. Banner

More information

Why Firewalls? Firewall Characteristics

Why Firewalls? Firewall Characteristics Why Firewalls? Firewalls are effective to: Protect local systems. Protect network-based security threats. Provide secured and controlled access to Internet. Provide restricted and controlled access from

More information

Honeypots. Security on Offense. by Kareem Sumner

Honeypots. Security on Offense. by Kareem Sumner Honeypots Security on Offense by Kareem Sumner Agenda Introduction What Are Honeypots? Objectives Successful Deployment Advantages And Disadvantages Types Of Honeypots Honeypot Software Future of Honeypots/Honeynets

More information

HONEYNET SOLUTIONS. A deployment guide 1. INTRODUCTION. Ronald C Dodge JR, Richard T Brown, Daniel J Ragsdale

HONEYNET SOLUTIONS. A deployment guide 1. INTRODUCTION. Ronald C Dodge JR, Richard T Brown, Daniel J Ragsdale HONEYNET SOLUTIONS A deployment guide Ronald C Dodge JR, Richard T Brown, Daniel J Ragsdale United States Military Academy Abstract: Key words: Honeynets provide network and system managers a unique intrusion

More information

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 8 System Vulnerabilities and Denial of Service Attacks System Vulnerabilities and

More information

CE Advanced Network Security Honeypots

CE Advanced Network Security Honeypots CE 817 - Advanced Network Security Honeypots Lecture 12 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained

More information

Computer Network Vulnerabilities

Computer Network Vulnerabilities Computer Network Vulnerabilities Objectives Explain how routers are used to protect networks Describe firewall technology Describe intrusion detection systems Describe honeypots Routers Routers are like

More information

A Distributed Intrusion Alert System

A Distributed Intrusion Alert System A Distributed Intrusion Alert System Chih-Yao Lin, Hsiang-Ren Shih, and Yomin Hou Taiwan National Computer Emergency Response Team {chinyao, shr, yominhou}@twncert.org.tw Abstract In this paper, a distributed

More information

Meeting 39. Guest Speaker Dr. Williams CEH Networking

Meeting 39. Guest Speaker Dr. Williams CEH Networking Cyber@UC Meeting 39 Guest Speaker Dr. Williams CEH Networking If You re New! Join our Slack ucyber.slack.com Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach,

More information

Improving the Effectiveness of Deceptive Honeynets through an Empirical Learning Approach

Improving the Effectiveness of Deceptive Honeynets through an Empirical Learning Approach Improving the Effectiveness of Deceptive Honeynets through an Empirical Learning Approach Nirbhay Gupta School of Computer and Information Science Edith Cowan University, Australia E-mail: nirbhaygupta@yahoo.com

More information

SE 4C03 Winter 2005 Network Firewalls

SE 4C03 Winter 2005 Network Firewalls SE 4C03 Winter 2005 Network Firewalls Mohammed Bashir Khan - 0150805 Last revised 2005-04-04 1.0 Introduction Firewalls are literally walls which are embedded in the external and internal network interface

More information

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data

Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Usage of Honeypot to Secure datacenter in Infrastructure as a Service data Ms. Priyanka Paliwal M. Tech. Student 2 nd yr.(comp. Science& Eng.) Government Engineering College Ajmer Ajmer, India (Erpriyanka_paliwal06@rediffmail.com)

More information

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it.

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it. Chapter Three test Name: Period: CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it. 1. What protocol does IPv6 use for hardware address resolution? A. ARP

More information

Setting-up WAN Emulation using WAN-Bridge Live-CD v1.10

Setting-up WAN Emulation using WAN-Bridge Live-CD v1.10 Setting-up WAN Emulation using WAN-Bridge Live-CD v1.10 Contents Document version 0.1 Overview... 2 What s New in Version 1.10... 2 Software Installed on the CD... 2 License... 3 Sample Lab Configurations...

More information

Guide to Computer Forensics. Third Edition. Chapter 11 Chapter 11 Network Forensics

Guide to Computer Forensics. Third Edition. Chapter 11 Chapter 11 Network Forensics Guide to Computer Forensics and Investigations Third Edition Chapter 11 Chapter 11 Network Forensics Objectives Describe the importance of network forensics Explain standard procedures for performing a

More information

IPCop Installation and Management. By: Kritsada Pinato (Bugfly)

IPCop Installation and Management. By: Kritsada Pinato (Bugfly) IPCop Installation and Management By: Kritsada Pinato (Bugfly) Introduction to IPCop What is IPCop? IPCop is a firewall; first, last and always. IPCop is a specialized Linux Distribution; complete, configured,

More information

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.

More information

Using Honeypots for Security Operations

Using Honeypots for Security Operations Using Honeypots for Security Operations Jim Barlow Head of Security Operations and Incident Response National Center for Supercomputing Applications (NCSA) University of Illinois

More information

Wireless USB Port Multi-Functional Printer Server. Model # AMPS240W. User s Manual. Ver. 1A

Wireless USB Port Multi-Functional Printer Server. Model # AMPS240W. User s Manual. Ver. 1A Wireless USB 2.0 1-Port Multi-Functional Printer Server Model # AMPS240W User s Manual Ver. 1A Table of Contents 1 Introduction...3 1.1 Package Contents... 3 1.2 System Requirements... 3 2 Multi-Functional

More information

CCNA Discovery Server Live CD v2.0

CCNA Discovery Server Live CD v2.0 CCNA Discovery Overview CCNA Discovery Server Live CD v2.0 Information and Installation Instructions The Discovery Server Live CD provides all of the network services necessary to support the CCNA Discovery

More information

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders:

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders: Intruders significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders: masquerader misfeasor clandestine user varying levels of competence

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 9 Networking Practices

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 9 Networking Practices : Managing, Maintaining, and Troubleshooting, 5e Chapter 9 Networking Practices Objectives Learn how to connect a computer or small network to the Internet using a broadband, satellite, or dialup connection

More information

SPOOFING. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

SPOOFING. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 SPOOFING Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Learning Objectives Students should be able to: Determine relevance of

More information

Linux Network Administration

Linux Network Administration Secure Remote Connections with OpenSSH Objective At the conclusion of this module, the student will be able to: Configure the ssh daemon start, stop, and restart sshd 17 January 2005 NETW 111 - SSH 2 SSH

More information

Survey of Cyber Moving Targets. Presented By Sharani Sankaran

Survey of Cyber Moving Targets. Presented By Sharani Sankaran Survey of Cyber Moving Targets Presented By Sharani Sankaran Moving Target Defense A cyber moving target technique refers to any technique that attempts to defend a system and increase the complexity of

More information

Firmware Revision History and Upgrade Instructions

Firmware Revision History and Upgrade Instructions SENSAPHONE Firmware Revision History and Upgrade Instructions Equipment Firmware: WEB600 v1.46 WEB600 with Relay Output v1.59 Release Date: July 15, 2013 The upgrade package has no prerequisites and supersedes

More information

Building an IPS solution for inline usage during Red Teaming

Building an IPS solution for inline usage during Red Teaming Building an IPS solution for inline usage during Red Teaming Repurposing defensive technologies for offensive Red Team operations K. Mladenov A. Zismer {kmladenov,azismer}@os3.nl Master Students in System

More information

Darknet Traffic Monitoring using Honeypot

Darknet Traffic Monitoring using Honeypot Darknet Traffic Monitoring using Honeypot 1 Hemal khorasia, 2 Mr. Girish Khilari 1 IT Systems & Network Security, 1 Gujarat Technological University, Ahmedabad, India Abstract - A "Darknet" is a portion

More information

Network Security. Chapter 0. Attacks and Attack Detection

Network Security. Chapter 0. Attacks and Attack Detection Network Security Chapter 0 Attacks and Attack Detection 1 Attacks and Attack Detection Have you ever been attacked (in the IT security sense)? What kind of attacks do you know? 2 What can happen? Part

More information

Beyond a sensor. Towards the Globalization of SURFids. FIRST 20 th Annual Conference Vancouver, Canada

Beyond a sensor. Towards the Globalization of SURFids. FIRST 20 th Annual Conference Vancouver, Canada Beyond a sensor Towards the Globalization of SURFids Wim.Biemolt@surfnet.nl FIRST 20 th Annual Conference Vancouver, Canada 1 SURFnet6 2 SURFcert 3 18 th Annual FIRST Conference Goals - Understanding:

More information

Lab1. Definition of Sniffing: Passive Sniffing: Active Sniffing: How Does ARP Spoofing (Poisoning) Work?

Lab1. Definition of Sniffing: Passive Sniffing: Active Sniffing: How Does ARP Spoofing (Poisoning) Work? Lab1 Definition of Sniffing: A program or device that captures vital information from the network traffic specific to a particular network. Passive Sniffing: It is called passive because it is difficult

More information

Chapter 2. Chapter 2 A. Configuring a Network Operating System

Chapter 2. Chapter 2 A. Configuring a Network Operating System Chapter 2 Chapter 2 A Configuring a Network Operating System Chapter 2 Cisco IOS IOS stands for Internetwork Operating System It is a family of software used on most Cisco Systems routers and current Cisco

More information

Man In The Middle Project completed by: John Ouimet and Kyle Newman

Man In The Middle Project completed by: John Ouimet and Kyle Newman Man In The Middle Project completed by: John Ouimet and Kyle Newman What is MITM? Man in the middle attacks are a form of eves dropping where the attacker relays messages that are sent between victims

More information

CYBER ATTACKS EXPLAINED: PACKET SPOOFING

CYBER ATTACKS EXPLAINED: PACKET SPOOFING CYBER ATTACKS EXPLAINED: PACKET SPOOFING Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service

More information

What action do you want to perform by issuing the above command?

What action do you want to perform by issuing the above command? 1 GIAC - GPEN GIACCertified Penetration Tester QUESTION: 1 You execute the following netcat command: c:\target\nc -1 -p 53 -d -e cmd.exe What action do you want to perform by issuing the above command?

More information

VG422R. User s Manual. Rev , 5

VG422R. User s Manual. Rev , 5 VG422R User s Manual Rev 1.0 2003, 5 CONGRATULATIONS ON YOUR PURCHASE OF VG422R... 1 THIS PACKAGE CONTAINS... 1 CONFIRM THAT YOU MEET INSTALLATION REQUIREMENTS... 1 1. INSTALLATION GUIDE... 2 1.1. HARDWARE

More information

Man in the middle. Bởi: Hung Tran

Man in the middle. Bởi: Hung Tran Man in the middle Bởi: Hung Tran INTRODUCTION In today society people rely a lot on the Internet for studying, doing research and doing business. Internet becomes an integral part of modern life and many

More information

Everyone will be working with a minimum of seven files on the network. All computers in the network must be able to connect to the laser printer.

Everyone will be working with a minimum of seven files on the network. All computers in the network must be able to connect to the laser printer. Purpose - Why the Client Needs the Network: The client needs the network for their office in a nearby town for their small company Mesh Networking Solutions. These people are all using stand-alone computer

More information

Oct 2007 Version 1.01

Oct 2007 Version 1.01 Oct 2007 Version 1.01 Table of Contents Introduction...4 System Requirement...4 Getting Started...4 Installing the Smart WLAN Manager...5 Discovering the Switch and AP...9 Understanding the Screen Layout...12

More information

Honey Pot Be afraid Be very afraid

Honey Pot Be afraid Be very afraid Honey Pot Be afraid Be very afraid Presented By Shubha Joshi M.Tech(CS) Problems with internet Why? Problems The Internet security is hard New attacks every day Our computers are static targets What should

More information

Configuring a Palo Alto Firewall in AWS

Configuring a Palo Alto Firewall in AWS Configuring a Palo Alto Firewall in AWS Version 1.0 10/19/2015 GRANT CARMICHAEL, MBA, CISSP, RHCA, ITIL For contact information visit Table of Contents The Network Design... 2 Step 1 Building the AWS network...

More information

Expert Reference Series of White Papers. Securing Layer 2

Expert Reference Series of White Papers. Securing Layer 2 Expert Reference Series of White Papers Securing Layer 2 1-800-COURSES www.globalknowledge.com Securing Layer 2 Carol Kavalla, Global Knowledge Instructor Introduction For many years network administrators

More information

Experiences with Building, Deploying and Running a remotecontrolled

Experiences with Building, Deploying and Running a remotecontrolled Corporate Technology Experiences with Building, Deploying and Running a remotecontrolled easily installable Network Sensor Bernd Grobauer, Siemens CERT Copyright Siemens AG 2007. All rights reserved. Imagine

More information

Honeypot Hacker Tracking and Computer Forensics

Honeypot Hacker Tracking and Computer Forensics Honeypot Hacker Tracking and Computer Forensics Manfred Hung manfred.hung@pisa.org.hk Agenda Honeypot History Value of Honeypot Honeypot Technology Common Honypot products/solutions Honeypot deployment

More information

Deploying File Based Security on Dynamic Honeypot Enabled Infrastructure as a Service Data Centre

Deploying File Based Security on Dynamic Honeypot Enabled Infrastructure as a Service Data Centre International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 6, Issue 7 (April 2013), PP. 23-27 Deploying File Based Security on Dynamic Honeypot

More information

Training UNIFIED SECURITY. Signature based packet analysis

Training UNIFIED SECURITY. Signature based packet analysis Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

Hands-On Ethical Hacking and Network Defense 3 rd Edition

Hands-On Ethical Hacking and Network Defense 3 rd Edition Hands-On Ethical Hacking and Network Defense 3 rd Edition Chapter 13 Network Protection Systems Last modified 1-11-17 Objectives Explain how routers are used to protect networks Describe firewall technology

More information

TECHNICAL NOTES. Player Security Statement. BrightSign, LLC Lark Ave., Suite 200 Los Gatos, CA

TECHNICAL NOTES. Player Security Statement. BrightSign, LLC Lark Ave., Suite 200 Los Gatos, CA TECHNICAL NOTES Player Security Statement BrightSign, LLC. 16795 Lark Ave., Suite 200 Los Gatos, CA 95032 408-852-9263 www.brightsign.biz INTRODUCTION The network settings of a BrightSign player are highly

More information

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Enterprise Network Security Describe the general methods used to mitigate security threats to Enterprise networks

More information

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr. Applied IT Security System Security Dr. Stephan Spitz Stephan.Spitz@de.gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System

More information

Wireless Networking. Dennis Rex SCALE 3X

Wireless Networking. Dennis Rex SCALE 3X Wireless Networking For Beginners Dennis Rex SCALE 3X - 2005 Agenda Wireless Choices 802.11A, B, G Devices - USB, PCI, PCMCIA, bridges Wireless chipsets - the good, the bad, the ugly Finding and installing

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

Securing CS-MARS C H A P T E R

Securing CS-MARS C H A P T E R C H A P T E R 4 Securing CS-MARS A Security Information Management (SIM) system can contain a tremendous amount of sensitive information. This is because it receives event logs from security systems throughout

More information

A Division of Cisco Systems, Inc. GHz Mbps. Wireless-G. User Guide. VPN Broadband Router WIRELESS WRV54G. Model No.

A Division of Cisco Systems, Inc. GHz Mbps. Wireless-G. User Guide. VPN Broadband Router WIRELESS WRV54G. Model No. A Division of Cisco Systems, Inc. GHz 2.4 54Mbps WIRELESS Wireless-G VPN Broadband Router User Guide Model No. WRV54G Copyright and Trademarks Specifications are subject to change without notice. Instant

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003 A system or combination of systems that enforces a boundary between two or more networks - NCSA

More information

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April-2013 1492 Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE,

More information

Opengate and Open space LAN in Saga University

Opengate and Open space LAN in Saga University Opengate and Open space LAN in Saga University Y. Watanabe, H. Eto, M. Otani, K. Watanabe, S. tadaki Open Campus Network Request In open space such as lecture room and lounge Public s used freely by students

More information

Meeting 40. CEH Networking

Meeting 40. CEH Networking Cyber@UC Meeting 40 CEH Networking If You re New! Join our Slack ucyber.slack.com SIGN IN! Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach, Recruitment

More information

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition Chapter 2 Investigating Network Traffic Objectives After completing this chapter, you should be able to: Understand network

More information

Honeyconf: Automated Script for generating Honeyd Configuration to Detect Intruders

Honeyconf: Automated Script for generating Honeyd Configuration to Detect Intruders Honeyconf: Automated Script for generating Honeyd Configuration to Detect Intruders Anu Kamboj 1, Ms. Renu Singla 2 1M.Tech Student, Dept. Of CSE, Shri Ram College of Engg. & Mgmt, Palwal, Haryana, India

More information

Chapter 2. Switch Concepts and Configuration. Part II

Chapter 2. Switch Concepts and Configuration. Part II Chapter 2 Switch Concepts and Configuration Part II CCNA3-1 Chapter 2-2 Switch Concepts and Configuration Configuring Switch Security MAC Address Flooding Passwords Spoofing Attacks Console Security Tools

More information

CHAPTER 2 ACTIVITY

CHAPTER 2 ACTIVITY CHAPTER 2 ACTIVITY 2.1.1.1 1. CLI stands for 2. GUI stands for 3. Write the step you used to go to CLI interface on Windows 4. The OS, normally loads from a disk drive, into RAM. 5. The portion of the

More information

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology ISSN 2229-5518 321 Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology Abstract - Nowadays all are working with cloud Environment(cloud

More information

n Describe sniffing concepts, including active and passive sniffing n Describe sniffing countermeasures n Describe signature analysis within Snort

n Describe sniffing concepts, including active and passive sniffing n Describe sniffing countermeasures n Describe signature analysis within Snort Outline n Describe sniffing concepts, including active and passive sniffing and protocols susceptible to sniffing n Describe ethical hacking techniques for Layer 2 traffic Chapter #4: n Describe sniffing

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wananga o te Upoko o te Ika a Maui. Computer Science

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wananga o te Upoko o te Ika a Maui. Computer Science VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wananga o te Upoko o te Ika a Maui School of Mathematical and Computing Sciences Computer Science PO Box 600 Wellington New Zealand Tel: +64 4 463 5341, Fax:

More information

Network Services, Cloud Computing and Virtualization

Network Services, Cloud Computing and Virtualization Network Services, Cloud Computing and Virtualization Client Side Virtualization Purpose of virtual machines Resource requirements Emulator requirements Security requirements Network requirements Hypervisor

More information

Challenges of Securing a Petascale Cluster

Challenges of Securing a Petascale Cluster Challenges of Securing a Petascale Cluster Christian Servin The University of Texas at El Paso Computational Sciences Program christians@miners.utep.edu Mentor: Irfan Elahi 1 Project Overview Security

More information

A Hybrid Honeypot Scheme for Distributed Denial of Service Attack

A Hybrid Honeypot Scheme for Distributed Denial of Service Attack American Journal of Electrical and Computer Engineering 2017; 1(1): 33-39 http://www.sciencepublishinggroup.com/j/ajece doi: 10.11648/j.ajece.20170101.15 A Hybrid Honeypot Scheme for Distributed Denial

More information

Hackveda Training - Ethical Hacking, Networking & Security

Hackveda Training - Ethical Hacking, Networking & Security Hackveda Training - Ethical Hacking, Networking & Security Day1: Hacking windows 7 / 8 system and security Part1 a.) Windows Login Password Bypass manually without CD / DVD b.) Windows Login Password Bypass

More information

The Applications and Gaming Tab - Port Range Forward

The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized

More information

ECCouncil Exam v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ]

ECCouncil Exam v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ] s@lm@n ECCouncil Exam 312-50v9 Certified Ethical Hacker Exam V9 Version: 7.0 [ Total Questions: 125 ] Question No : 1 An Intrusion Detection System(IDS) has alerted the network administrator to a possibly

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Instructor: Mahadevan Gomathisankaran mgomathi@unt.edu CSCE 4550/5550, Fall 2009 Lecture 10 1 Announcements Project Group Due today Attendance Mandatory Ave. 85% ( 4 absentees

More information

Making a Bootable Linux USB Flash Drive with the Universal USB Installer.

Making a Bootable Linux USB Flash Drive with the Universal USB Installer. Making a Bootable Linux USB Flash Drive with the Universal USB Installer. Insert the target USB flash drive into the USB port before starting the installer program. This is the start up screen for the

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Intrusion Detection Systems Intrusion Actions aimed at compromising the security of the target (confidentiality, integrity, availability of computing/networking

More information

Chapter 9. Firewalls

Chapter 9. Firewalls Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however

More information

Denial of Service and Distributed Denial of Service Attacks

Denial of Service and Distributed Denial of Service Attacks Denial of Service and Distributed Denial of Service Attacks Objectives: 1. To understand denial of service and distributed denial of service. 2. To take a glance about DoS techniques. Distributed denial

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

Definition of firewall

Definition of firewall Internet Firewalls Definitions: firewall, policy, router, gateway, proxy NAT: Network Address Translation Source NAT, Destination NAT, Port forwarding NAT firewall compromise via UPnP/IGD Packet filtering

More information

Russian Cyber Attack Warning and Impact on AccessEnforcer UTM Firewall

Russian Cyber Attack Warning and Impact on AccessEnforcer UTM Firewall Russian Cyber Attack Warning and Impact on AccessEnforcer UTM Firewall 1 U.S. and U.K. authorities last week alerted the public to an on-going effort to exploit network infrastructure devices including

More information

NETWORK SECURITY. Ch. 3: Network Attacks

NETWORK SECURITY. Ch. 3: Network Attacks NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network

More information

Firewalls 1. Firewalls. Alexander Khodenko

Firewalls 1. Firewalls. Alexander Khodenko Firewalls 1 Firewalls Alexander Khodenko May 01, 2003 Firewalls 2 Firewalls Firewall is defined as a linkage in a network, which relays only those data packets that are clearly intended for and authorized

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

FinIntrusion Kit / Release Notes. FINFISHER: FinIntrusion Kit 4.0 Release Notes

FinIntrusion Kit / Release Notes. FINFISHER: FinIntrusion Kit 4.0 Release Notes 1 FINFISHER: FinIntrusion Kit 4.0 Release Notes 2 Copyright 2013 by Gamma Group International, UK Date 2013-07-12 Release information Version Date Author Remarks 1.0 2010-06-29 ht Initial version 2.0 2011-05-26

More information

INTRUSION DETECTION SYSTEM BASED SNORT USING HIERARCHICAL CLUSTERING

INTRUSION DETECTION SYSTEM BASED SNORT USING HIERARCHICAL CLUSTERING INTRUSION DETECTION SYSTEM BASED SNORT USING HIERARCHICAL CLUSTERING Moch. Zen Samsono Hadi, Entin M. K., Aries Pratiarso, Ellysabeth J. C. Telecommunication Department Electronic Engineering Polytechnic

More information

ch02 True/False Indicate whether the statement is true or false.

ch02 True/False Indicate whether the statement is true or false. ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be

More information

Mile2 MK CPTS - Certified Pen Testing Specialist. Download Full Version :

Mile2 MK CPTS - Certified Pen Testing Specialist. Download Full Version : Mile2 MK0-201 CPTS - Certified Pen Testing Specialist Download Full Version : http://killexams.com/pass4sure/exam-detail/mk0-201 D. IP Poisoning QUESTION: 234 When a network switch receives a very large

More information

CIT 380: Securing Computer Systems. Network Security Concepts

CIT 380: Securing Computer Systems. Network Security Concepts CIT 380: Securing Computer Systems Network Security Concepts Topics 1. Protocols and Layers 2. Layer 2 Network Concepts 3. MAC Spoofing 4. ARP 5. ARP Spoofing 6. Network Sniffing Protocols A protocol defines

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Surveillance Flexibility with GeoVision Wireless Cube IP Cameras

Surveillance Flexibility with GeoVision Wireless Cube IP Cameras Surveillance Flexibility with GeoVision Wireless Cube IP Cameras Applied to Article ID: GV15-13-03-07-l Release Date: 03/07/2013 GV-CBW120 / 220 GV-CAW120 / 220 Introduction Taking advantage of the light

More information

Install Windows Update Windows 7 From Usb Iso Image

Install Windows Update Windows 7 From Usb Iso Image Install Windows Update Windows 7 From Usb Iso Image Follow these instructions to download and install the Windows 10 Insider Preview. For burning an ISO image to a USB thumb drive, the Windows 7 USB/DVD

More information

Quick Lockdown Guide. Firmware 6.4

Quick Lockdown Guide. Firmware 6.4 Bosch Security Bosch Security Systems System Video Systems Video Systems Bosch Security Systems Video Systems Quick Lockdown Guide Firmware 6.4 Overview The purpose of this technical brief is to provide

More information

User module. Guest Configuration APPLICATION NOTE

User module. Guest Configuration APPLICATION NOTE User module Guest Configuration APPLICATION NOTE USED SYMBOLS Used symbols Danger important notice, which may have an influence on the user s safety or the function of the device. Attention notice on possible

More information

Jaringan Komputer (CCNA-1)

Jaringan Komputer (CCNA-1) Jaringan Komputer (CCNA-1) #2 Configuring a Network Operating System Susmini I. Lestariningati, M.T Introduction (1) Home networks typically interconnect a wide variety of end devices including PCs, laptops,

More information

Linux in the connected car platform

Linux in the connected car platform Linux in the connected car platform Background Long time desktop Linux user Designed several capes for the BeagleBone Black Currently an Embedded engineer for Dialexa What is a connected car anyway? A

More information

Chapter 7 Forensic Duplication

Chapter 7 Forensic Duplication Chapter 7 Forensic Duplication Ed Crowley Spring 11 Topics Response Strategies Forensic Duplicates and Evidence Federal Rules of Evidence What is a Forensic Duplicate? Hard Drive Development Forensic Tool

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 250-530 Title : Administration of Symantec Network Access Control 12.1 Vendors : Symantec

More information

Audio Signage Solution

Audio Signage Solution Audio Signage Solution Automatic broadcasting and playback of Audio Signage channels User Manual v1.0 Components: Barix Instreamer(s) Audio Signage app ios Audio Signage app Android ASIS Firmware on Exstreamer

More information